Metamail.Format.String.Handling

description-logoDescription

Metamail is vulnerable to a number of format string exploits. The first vulnerability is in the "SaveSquirrelFile()" function. If a malicious attacker sends a specially crafted message containing a "multipart/alternative" media type and format specifiers in the "Content-Type" header, it can lead to the execution of arbitrary code. The second vulnerabilitiy exists in the "PrintHeader()" function when handling messages containing certain characters in the mail header. It can be exploited by including format specifiers leading to the execution of arbitrary code.

affected-products-logoAffected Products

Metamail Metamail 2.7

Impact logoImpact

Compromise of the affected system.

recomended-action-logoRecommended Actions

Apply appropriate patch from the vendor or upgrade to non-vulnerable version if available.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)